
APPLICATION NOTES – CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC
Copyright 2003, ASUSTeK Computer, Inc. Page 31
Figure 4.1. Ping Example for Verifying IPSec VPN Connection
4.2 Monitor IPSec VPN Traffic on the Internet Security Router
The Internet Security Router comes with the monitoring tool for the IPSec VPN traffic. Click the VPN menu and
then click the “Statistics” submenu to see the VPN Statistics page, as shown in Figure 4.2. This page shows
information regarding IKE (Internet Key Exchange) and IPSec. You may use it to find out problems w/ the IPSec
traffic. For example, if there is a problem during IKE, the “Phase1 Status” column will display a message for the
problem. To find out details on IPSec SA (security association), click the icon to display the IPSec SA page as
shown in Figure 4.3.
Ping response during negotiation
of the VPN tunnel.
response.
Commentaires sur ces manuels